How to conduct a current state assessment of opioid risk and misuse in your population
Opioid addiction has reached crisis levels in the U.S., affecting not only individuals and families but ... Continue reading →

Any apprehension about how InsurTech will add value in the insurance value chain is moot in pricing and underwriting. With support from InsurTech start-ups, insurers are going to be front runners or i... Continue reading →

In order to understand what the future may be like, it is imperative to understand the present. One of the most effective uses of scenarios is to take an envisioned future state and work backward to e... Continue reading →

Blogger Archives: Gamelah Palagonia

Gamelah Palagonia

Gamelah Palagonia is a Senior Vice President for Network Security, Data Privacy and Technology Errors & Omissions at Willis Towers Watson. With more than 25 years of risk management and insurance brokerage experience, she is one of the first insurance professionals to specialize in online media, intellectual property, and technology errors and omissions liability and cyber risks. Gamelah is a recognized thought leader in cyber and privacy liability insurance and risk management, and a frequent speaker and author on the topic.

Personal information is being exposed in more places, through more “things” and to more people every day, creating new risks for people, businesses, health care organizations, governments and society as a whole. Continue reading →

The Telephone Consumer Protection Act (TCPA) may have real implications for businesses that use robocalls and telemarketing calls. But there are actions businesses can take to modernize their compliance strategy and steer clear of potential litigation. What is TCPA? TCPA … Continue reading →

All the major information security firms credit humans and social engineering, in the form of phishing and spear-phishing emails, as the root cause of most cyber-attacks. By using social engineering techniques, attackers can efficiently and cost effectively deliver malicious software, … Continue reading →

Hoteliers have long been major hacking targets – a trend that is likely to continue given the volume of credit and debit card transactions the industry processes. While all businesses should assess and implement comprehensive privacy and data security policies … Continue reading →